International Journal of Network Management

Cover image for Vol. 22 Issue 1

January/February 2012

Volume 22, Issue 1

Pages i–ii, 1–94

  1. Issue Information

    1. Top of page
    2. Issue Information
    3. Research Articles
    1. Issue Information (pages i–ii)

      Article first published online: 16 JAN 2012 | DOI: 10.1002/nem.1799

  2. Research Articles

    1. Top of page
    2. Issue Information
    3. Research Articles
    1. Incentive-rewarding mechanism to stimulate activities in social networking services (pages 1–11)

      Kazufumi Yogo, Ryoichi Shinkuma, Taku Konishi, Satoko Itaya, Shinichi Doi, Keiji Yamada and Tatsuro Takahashi

      Article first published online: 4 APR 2011 | DOI: 10.1002/nem.779

      Thumbnail image of graphical abstract

      We have developed an incentive-rewarding mechanism that stimulates activities in social networking services (SNSs), including content uploading and link establishment. We particularly focus on changing the reward assignment ratio based on the different risks users perceive when uploading content with different privacy settings: public-open and friend-limited. Simulation results suggested that the optimal reward assignment ratio to maximize SNS activity changes depending on the total amount of available reward resources.

    2. Packet-level open-digest fingerprinting for spam detection on middleboxes (pages 12–26)

      Muhammad N. Marsono

      Article first published online: 20 APR 2011 | DOI: 10.1002/nem.780

      Thumbnail image of graphical abstract

      This paper proposes a stateless open-digest spam fingerprinting for implementation on middleboxes for fast spam detection at receiving email servers to support more effective spam handling of both inbound and outbound (relayed) emails. The work focuses on evaluating the accuracy of spam fingerprinting at the packet level with consideration on the constraints of processing byte streams over the network.

    3. Asynchronous failed sensor node detection method for sensor networks (pages 27–49)

      Kazi Sakib

      Article first published online: 27 OCT 2011 | DOI: 10.1002/nem.782

      Thumbnail image of graphical abstract

      This paper addresses the failed sensor node detection issues and proposes a novel method to detect failed nodes asynchronously. The new approach has taken the trivial considerations of a sensor network such as the resource scarcity, appropriately and proves to be accurate and complete.

    4. GigaManP2P: an overlay network for distributed QoS management and resilient routing (pages 50–64)

      Elias P. Duarte Jr, Lisandro Z. Granville, Luci Pirmez, José Neuman de Souza, Rossana C. Andrade, Liane Tarouco, Reinaldo B. Correia and Alexandre Lages

      Article first published online: 24 MAY 2011 | DOI: 10.1002/nem.785

      Thumbnail image of graphical abstract

      GigaManP2P is a management overlay for long-distance, high-speed optical backbones that span multiple administrative domains. GigaManP2P peers provide management services in a ubiquitous fashion, in particular services to negotiate, monitor and continuously enforce the required quality of service (QoS) for applications that span multiple domains. After detecting a QoS constraint violation trend, a proactive rerouting strategy is triggered based on redundant virtual circuits, allowing both full and partial rerouting. The system has been deployed on the Brazilian RNP backbone.

    5. Video-on-Demand (VoD) deployment over hospitality networks (pages 65–80)

      Khaled Salah, Jamil Hamodi, Zubair A. Baig and Fahd Al-Haidari

      Article first published online: 14 JUL 2011 | DOI: 10.1002/nem.787

      Thumbnail image of graphical abstract

      The deployment of VoD over existing IP networks is done these days in an arbitrary manner without applying proper engineering principles. This paper presents an engineering approach to deploy VoD services over IP-based hospitality networks, as those networks seen in hotels and hospitals. The proposed approach determines the total number of VoD sessions that can be sustained by an existing hospitality network, while satisfying the QoS requirements of all network services, and at the same time leaving adequate capacity for future growth.

    6. An epistemic event-based correlation approach for managing pervasive networks (pages 81–94)

      Vinayak Ganapathy, Niki Pissinou, S. Kami Makki and Bakhtiar Qutub Ali

      Article first published online: 21 JUN 2011 | DOI: 10.1002/nem.788

      Thumbnail image of graphical abstract

      This paper analyzes complex-event semantic correlation that examines epistemic uncertainty in computer networks by using Dempster-Shafer theory to support a high-volume, event-based, in-network and non-deterministic pervasive network management. The work establishes that a lightweight, distributed, large-volume, event-based technique which exploits epistemic uncertainty to correlate events along contextual dimensions provides a successful technique for enabling management of large-scale and pervasive contemporary and future computer networks.

SEARCH

SEARCH BY CITATION